RE: namedroppers, continued

2002-12-09 Thread Dean Anderson
Every domain would have to have a public key that the public could find.
Then every mailserver would have to check every message.

And spammers could still send spam, because they are authorized to send
email from some ISP, using that ISP's domain, and that ISP mailserver will
sign their email.

Spam isn't a security problem that can be solved technically.

Spam is the exact same problem as when Randy Bush harrasses someone by
abusing his privileges as administrator. There isn't a technical solution,
other than removing the privileges. Then the new administrator could abuse
the privileges, if they were so inclined.  There isn't a technical way to
give someone privileges that they can't abuse, if so inclined.

--Dean

On Fri, 6 Dec 2002, Fred Baker wrote:

 [ post by non-subscriber.  with the massive amount of spam, it is easy to miss
   and therefore delete posts by non-subscribers.  if you wish to regularly
   post from an address that is not subscribed to this mailing list, send a
   message to listname[EMAIL PROTECTED] and ask to have the alternate
   address added to the list of addresses from which submissions are
   automatically accepted. ]

 At 08:28 AM 12/2/2002 -0800, Hallam-Baker, Phillip wrote:
 The only way to resolve this issue properly would be to require every
 submission to an IETF mailing list to be cryptographically signed (PGP
 or S/MIME), to require the subscribers to register their signing key and
 to then filter the mail sent out on the list so that only signed mail
 gets through.

 I would be in favor of that, personally, as long as we can ensure that the
 appropriate signature facility (be it RSA, PGP, or whatever) is freely
 available to all who need to use it. The issue here is not us corporate
 types who have a business reason to buy the software, it is the students
 who often lack the funds. The big issue would be the procedures for posting
 one's key to the appropriate place - what is to stop a spammer from posting
 a key and sending the spam anyway? I'm not proposing a mechanism, but
 someone who is good at such things might well find it of value.

 It doesn't address the off topic issue. As you say, that could be left to
 a working group chair equiped with formal procedures developed by consensus
 within the work group or adopted by the working group from a more general
 place (ie, the IETF could suggest a procedure, and the WG could adopt it if
 it didn't feel another procedure would be better).

 I have had a private exchange, over the past few days, with someone who
 wished that the IETF would please document some good spam-elimination
 procedure, so that it could be used world-wide to completely eliminate
 spam. I think that boils down to provide a global PKI in this solution,
 and presumes that spammers are incapable of using one. That might be a
 great research topic. Too bad nobody has ever thought of it before; we
 could really use the outcome of that research. (OK, so it's a lame attempt
 at humor...)

 I think it was Steve Bellovin that suggested a procedure for reducing the
 utility of spoofing source addresses in emails; if not, it was me and I
 happened to suggest something his favorite algorithm fit into, by having a
 host in each mail domain (mailid.example.com) be able to assert that its
 domain had or had not sent an email within a given recent  time period
 whose MD5 hash, when divided by vector of prime numbers resulted in
 vector of remainders. I could write that up in an internet draft if folks
 think it makes sense. That would be a more global procedure that didn't
 require a PKI and only addressed spoofed addresses.



 --
 to unsubscribe send a message to [EMAIL PROTECTED] with
 the word 'unsubscribe' in a single line as the message text body.
 archive: http://ops.ietf.org/lists/namedroppers/





RE: namedroppers, continued

2002-12-09 Thread Dean Anderson
And how much before Randy was moderator?

I'm on other large, subscriber-restricted, public lists, where this isn't
a significant problem.

--Dean

On Fri, 6 Dec 2002, Hallam-Baker, Phillip wrote:


  How much spam is going to namedroppers?

 Well none since Randy Bush and a bunch of others turned
 on the moderator bit.

 The problem here is that having Randy Bush moderate is
 not a scalable solution to the problems of Spam in general.


   Phill







RE: namedroppers, continued

2002-12-09 Thread John C Klensin


--On Friday, 06 December, 2002 16:22 -0700 Vernon Schryver
[EMAIL PROTECTED] wrote:


From: Marc Schneiders [EMAIL PROTECTED]



...
It might be easier to write a new protocol to succeed email,
instant messaging, mobile phones (something useful in itself)
with built-in abuse control from the start.


That's another stupid crackpot spam solution that just won't
go away.

You cannot have abuse control built into a protocol that
allows strangers to send each other mail.  Any mail protocol
that lets you receive mail from a stranger must also let the
stranger send the same message to you and to 30,000,000 of
your closest friends.  On the other hand, if you want to only
accept mail from people who are not strangers, you can use any
of the many official and ad hoc SMTP extensions to ensure you
only receive mail from them.

If your computer system, mail protocol, or whatever knows that
a stranger is not a spammer, then the stranger is not really a
stranger.


Actually, Vernon, there is a well-known, established
implementation of this approach.  It depends on no one being
able to deliver mail to anyone else except through a network of
trusted intermediaries, who are interconnected with bilateral
agreements.  Each of those intermediaries is essentially
required to authenticate any user sending a message, which they
naturally tend to do because the system strongly assumes a
per-message and per-recipient charging model with settlements
between the originating and receiving intermediary systems.

If spammers tried to use it, they would rapidly become
discouraged, first of all because the per-message charging would
destroy their free to us, steal resources from others business
model and second because the accounting and authentication
machinery that is essential to the business models of the
intermediary system vendors (let's call them ADMDs for short)
would make tracking them down fairly easy.  And, of course, the
bilateral agreements would make it fairly easy to isolate and
punish an ADMD who didn't control its spammers or pay it
settlement bills.

I suppose I can leave the name of this high-quality,
significantly overengineered, widely-deployed system as an
exercise.

Been there, wasted a lot of time, energy, and resources, gave up.

   john




RE: namedroppers, continued

2002-12-09 Thread Hallam-Baker, Phillip
Don't discount the unexloited features already supported in the deployed
base.

In particular most mail servers support inline SSL connection upgrades,
or can be upgraded to do so with minimal hassle.

Another instance in which a self signed cert is possibly sufficient
authentication - although when you consider the security you get from
upgrading the connection to SSL the price of the cert is kinda de
minimis but I'll play along with the rulling IETF assumption of millions
for hardware, not a cent for software.


Phill

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
 Sent: Friday, December 06, 2002 3:59 PM
 To: Marc Schneiders
 Cc: Fred Baker; Hallam-Baker, Phillip; [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: RE: namedroppers, continued


 I'v been saying about need for more radical change in mail
 protocol for
 years now on mailing lists. I'd rather work on smtp itself, but some
 people who were involved in original protocol do not want any serious
 changes to what they'v done, though its clear that abuse and
 other holes
 with current system is creating too many problems.

 In any case, by next ietf meeting in san francisco, I'll
 bring complete
 proposal for new protocol and might even try some practical
 tests. I do still
 believe that smtp can be saved, but not without more complex
 authentication
 system during delivery of email and that can't be done with current
 protocol design or current available extension process.

 Also were there any discussions or more complete discription of this
 algorithm for checking if host had sent an email and if so is this
 available on website or archive to read more about? If answer
 is yes, can
 somebody send me url or approximate date of discussions so I
 could lookup
 in archives.

 And am I correct here in understanding what was proposed is that smtp
 conversation id be such that receiving mail server could verify with
 sender (callback?) that it deed indeed initiate the email. If
 so I do not
 quite understand how MD5 helps there, plus I see quite a few
 problems with
 creating some special mx-like record in dns just for verification. If
 this is indeed what was proposed its better to go with paul vixie's
 proposal of mailfrom dns record -
http://www.vix.com/~vixie/mailfrom.txt or
http://www.ietf.org/internet-drafts/draft-church-dns-mail-sender-02.txt

On Fri, 6 Dec 2002, Marc Schneiders wrote:

 On Fri, 6 Dec 2002, at 13:41 [=GMT-0800], Fred Baker wrote:

  I think it was Steve Bellovin that suggested a procedure for
reducing the
  utility of spoofing source addresses in emails; if not, it was me
and I
  happened to suggest something his favorite algorithm fit into, by
having a
  host in each mail domain (mailid.example.com) be able to assert that
its
  domain had or had not sent an email within a given recent  time
period
  whose MD5 hash, when divided by vector of prime numbers resulted
in
  vector of remainders. I could write that up in an internet draft
if folks
  think it makes sense. That would be a more global procedure that
didn't
  require a PKI and only addressed spoofed addresses.

 Spammers would be the first to set up your mailid host. They will have
 had years of experience to find holes in the system before you've
 convinced everyone to adopt or accept the mailid.

 It might be easier to write a new protocol to succeed email, instant
 messaging, mobile phones (something useful in itself) with built-in
 abuse control from the start.





smime.p7s
Description: application/pkcs7-signature


Re: IETF Sub-IP area: request for input

2002-12-09 Thread Pyda Srisuresh
I vote for DP1 - Moving the WGs back to one of the
existing permanent areas. Otherwise, the problem of
coordination with related permanent areas is likely
to get worse.

regards,
suresh

--- Alex Zinin [EMAIL PROTECTED] wrote:
 FYI below. (Sorry for cross-posting.)
 Please post follow-ups to [EMAIL PROTECTED]
 --
 Alex

 This is a forwarded message
 From: The IESG [EMAIL PROTECTED]
 To:
 Cc:
 Date: Wednesday, December 04, 2002, 8:08:49 AM
 Subject: IETF Sub-IP area: request for input

 ===8==Original message text===


 IETF SUB-IP area

  The IESG announced in November of 2000 that a new SUB-IP temporary
  pseudo-area would be formed as a part of an effort to develop a
  systematic approach to dealing with what we used to describe as
  sub-IP technologies. At the time the IESG said:

  Over the years the boundary between 'wires' and IP protocols has
  become harder to define and the interaction has become more intertwined.
  For example, what appear as 'wires' or 'circuits' in a virtual network
  may in fact be routed datagrams in an underlying IP network. The
  topology of dynamic underlying networks such as ATM and soon switched
  optical networks can interact with IP-level traffic engineering and
  routing. Additionally, with IETF technologies such as MPLS we are
  defining a whole new class of 'wires'.
  (http://www.ietf.org/IESG/STATEMENTS/new-area.txt)

  After the December 2000 IETF meeting and taking into account the
  discussion at that meeting the IESG formed a temporary SUB-IP Area.
  IN the announcement of this action the IESG said:

  It is temporary because the IESG believes that this concentrated
  sub-IP effort will likely be of short duration, on the order of a year
  or two. We feel that much of the work will be done by then, and the
  working groups closed. Any working groups that have not finished when
  the IESG determines that the area should be closed will be moved into
  existing the IETF areas where they seem to have the best fit. and The
  IESG expects to review the development process and charters, however;
  if we conclude that this expectation is incorrect, we will need to make
  this area more formal. At that point, the nominating committee will be
  asked to supply dedicated area directors.
  (http://www.ietf.org/IESG/STATEMENTS/sub_area.txt)

  Although the SUB-IP working groups have made considerable progress
  (with 7 RFCs published, another 12 IDs approved for publication, 9 IDs
  under IESG consideration and an additional 11 IDs having been passed to
  the ADs for their evaluation) their work is not yet done (with 53
  working group IDs currently in progress). It does appear that some of
  the working groups could finish the work in their charters over the next
  6 months but it could be a lot longer for others.

  Because the end is in sight for some of the working groups and since the
  IESG had generally assumed that the area would be a temporary one and
  the second anniversary of the creation of the SUB-IP area is next spring,
  analysis was started in the IESG to figure out which areas would be the
  best ones for the SUB-IP working groups to move to so that they could
  continue their work.

  As part of that analysis a SUB-IP area session was held during the IETF
  meeting in Atlanta where this topic was discussed.

  There was a spirited discussion during the session on the best path
  forward. The opinions ranged from following the distribution of
  working groups, to doing so with some specific changes to keeping the
  working groups in a separate SUB-IP area. A sense of the room was
  taken at the end of the discussion and that sense was very strongly
  that the SUB-IP Area should become a long-term (the description that
  was used during the consensus call) one and that the nomcom be asked
  to nominate a person (or persons) to become director(s) of the SUB-IP
  area.

  To help provide more information as input for the IESG discussion we
  would like to continue the discussion started in Atlanta on the mailing
  list. It is our intention to keep the discussion on the future of the
  SUB-IP area open, but short-lived, because it would be a very good idea
  to let the nomcom know ASAP what the future holds as they need to know
  what expertise is needed in the ADs for the existing areas and if they
  need to search for additional people.

  The IESG aim is to be able to let the nomcom know what the future of
  the SUB-IP work is by the end of the day of Thursday Dec 12th. That
  date was chosen because it is the date of the next IESG teleconference
  yet it provides some time for a public discussion.

  The options seem to be:
  1/ move WGs (back) to permanent areas: migrate the SUB-IP
  working groups to other IETF areas sometime soon, likely before next
  summer and close the SUB-IP area. Also, reconstitute the SUB-IP (and/or
  other) directorates to ensure the continued coordination between the
  remaining WGs.


a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Scott Bradner

for what it's worth here is my personal opionion on what we should
do in the question of the sub-ip area

I think we should go with the status quo (with the IESG selecting two
suck^H^H^H^Hvolunteers to manage the area next March)

I do not think that we can make a reasoned decision to do otherwise in the
next week.

Before Atlanta I was of the opinion that moving the WGs into other areas
was the right thing to do, not because of any particular event, but
more because we had said this was a temporary area and it was getting
to be a long temporary (but I suppose we should note that the last
temporary area (ipng) lasted 4 years)  But the feedback we got in
Atlanta has convinced me that this is not reason enough to make a change.

temporary area (ipng) lasted 4 years)  But the feedback we got in
Atlanta has convinced me that this is not reason enough to make a change.
And any move at this time to move the WGs would be seen as a slap in
the face of the quite strong (even if in a limited venue) opinion
expressed in Atlanta.

Right after Atlanta I was convinced that we should follow the consensus and
ask the nomcom to find a AD but upon refection I'm not sure that is the
right thing either - partially  because as Randy has pointed out, we do
not have a clear mission statement for such an area but mostly because
enough of the WGs are close enough to finishing up that we whould have a
quite small area in 6 months to a year and an area with only 2 or 3  
working groups seems a bit of a waste.  But if there is a long-term
future for sub-IP work in the IETF then aditional working groups may
be in the offering.  We need the time to reflect on what that future  
should be.

So I think we should continue as-is until:
1/ the WGs which will finish soon finish
2/ we (the IESG, IAB  ietf community) figure out what role  
   sub-ip should play in the IETF in the long term

but it would be good to hear from more of you both to the IETF list and
to the IESG directly

Scott




Re: namedroppers, continued

2002-12-09 Thread Stephen Sprunk
Vernon Schryver wrote:
 It's been years since it was possible to be amused by the number of
 people who assume that spammers are more ignorant and less competent
 than they are, and so propose spam solutions predicated on spammers
 being unable to register as many names, keys, identities, or whatever
 as needed or as many as everybody else can.

The problem I've seen repeatedly, including in an off-list discussion I'm
having about this topic, is people confusing authentication with
authorization.

Even if you can authenticate every sender of every piece of email, that
gains us virtually nothing -- not to mention it's a reasonably well-solved
problem, e.g. PGP, S/MIME.  As Vernon notes, spammers can create authentic
credentials just as easily as anyone else.

The devil is in determining what senders are authorized once we've
authenticated them.  My fear is the only effective solution may turn out to
be closed lists with permission grants, such as the IM services introduced
to keep spammers out.  That will greatly reduce the utility of email.

S




Re: namedroppers, continued

2002-12-09 Thread Stephen Sprunk
Paul Vixie wrote:
 - many ISPs won't let you forward or submit mail through someone
   else's SMTP server, even if you have permission to do so.  so you
   can't forward your mail through your home ISP's mail server to
   allow the mail from check to work.

 in that case you'd be wise to not insert a MAIL-FROM MX for your
 domain.

The vast majority of users do not have the ability to make that decision.

The curious thing is that it is in an ISP's best interests _not_ to
implement this draft, since doing so will likely mark nomadic users' email
as suspect and potentially lose a customer.  Most companies only support the
public good to the extent it doesn't cost them any revenue.

S




Re: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Joe Touch
Scott Bradner wrote:

for what it's worth here is my personal opionion on what we should
do in the question of the sub-ip area

I think we should go with the status quo (with the IESG selecting two
volunteers to manage the area next March)

I do not think that we can make a reasoned decision to do otherwise in the
next week.

Before Atlanta I was of the opinion that moving the WGs into other areas
was the right thing to do, not because of any particular event, but
more because we had said this was a temporary area and it was getting
to be a long temporary (but I suppose we should note that the last
temporary area (ipng) lasted 4 years)  But the feedback we got in
Atlanta has convinced me that this is not reason enough to make a change.


I'll add that most of the attendees at this meeting in Atlanta were from 
the WGs themselves. It is unsurprising that the overwhelming position of 
that group is to maintain the status quo. Moving them is definitely seen 
as unwelcome change from within the groups themselves.

It would be useful to hear from the community at large regarding this 
issue, rather than letting the group decide (essentially) for itself.

FWIW, I have yet to see a substantive justification for the _creation_ 
of a new area yet. I, and others, have pointed out that the 'status quo' 
here is to let the area dissolve on schedule.

Joe




RE: namedroppers, continued

2002-12-09 Thread Dean Anderson
This seems clever, however, it will also take significant computational
effort to verify the computational effort was actually done. Even if a
class of functions are found that are easier to verify than to compute,
they will no doubt still take up a significant fraction of time.

Also, all outgoing messages would need this computation, since a
mailserver does not know who it has sent mail to in the past, and whether
they are still in receipt of the verification.  So then you would only be
able to send 8000 messages a day, too.

Clearly, that doesn't scale very well.

It seems unlikely that this would change the percentage of spam, since it
would merely reduce the total amount of mail sent.

I haven't observed a recent proliferation of spam, however. Spam seems to
be level.

--Dean

On Fri, 6 Dec 2002, Ayyasamy, Senthilkumar  (UMKC-Student) wrote:
 this is the work all about (yesterday's seminar in a MIT group)

  If I don't know you, and you want your e-mail to appear in my
   inbox, then you must attach to your message an easily verified
  proof of computational effort, just for me and just for this
  message.

 If the proof of effort requires, say, 10 seconds to compute, then the
 economics of sending spam are radically altered, as a single machine
 can send only 8,000 messages per day.

 The recent proliferation of spam has lead to a renewed interest in
 these ideas.  This  work is about both the choice of
 functions that can be used to yield easily verifiable proofs of
 computational effort, and architectures for implementing the proof of
 effort approach.  Filtering and/or forcing senders to pay in other
 currencies, such as human attention and money, will be covered as time
 permits


 for more details http://research.microsoft.com/research/sv/PennyBlack



 --
 to unsubscribe send a message to [EMAIL PROTECTED] with
 the word 'unsubscribe' in a single line as the message text body.
 archive: http://ops.ietf.org/lists/namedroppers/





Re: namedroppers, continued

2002-12-09 Thread Dean Anderson
This doesn't adequately describe backup relays.  If uunet is providing an
alternate relay service, then all or any of uunet's relays might be
providing that service. So it would have to be able to recursively look up
uunets mail-from mx's, and the mail-from mx's of any subdomains listed by
uunet.  This process might contain loops.

Additionally, the mail forwarding behavior is highly undesirable.  A large
mail site does not want to have to manually configure essentially the
whole of the internet as possible multi-stage mail relays so that its
users can forward mail from other servers to their mailbox. Indeed, even a
relatively small site would not want to do that.

However, even this approach won't stop spam, since a spammer will still be
able to use their ISP's mailservers, with a stolen, or disposable account.
There are plenty of KLEZ viruses out there, and plenty of stolen
passwords. And it won't have any effect at all on spam from real
commercial operators like Exactis who don't forge the from addresses.

Essentially, I'm convinced after years of interaction with some radical
anti-spammers that most of the non-commercial spam (and quite a lot of the
forged-address spam) is sent by anti-spammers trying to essentially
terrorize their way to some kind of technical solution that they think
exists. However, no such solution exists.  If there were such a solution,
we could prevent all kinds of evils, like government corruption,
embezzlement, misuse of all kinds of property.  But there is no substitute
for honesty and responsibility. If someone has possession of a privilege,
(however that privilege was obtained--it may have been stolen), and they
are so inclined to abuse that privilege, the only way to stop them is to
remove the privilege.

--Dean

On Sat, 7 Dec 2002, Paul Vixie wrote:

 it's difficult to imagine a mailing list for which this thread is on-topic.

  I think it was Steve Bellovin that suggested a procedure for reducing the
  utility of spoofing source addresses in emails; if not, it was me and I
  happened to suggest something his favorite algorithm fit into, by having a
  host in each mail domain (mailid.example.com) be able to assert that its
  domain had or had not sent an email within a given recent  time period
  whose MD5 hash, when divided by vector of prime numbers resulted in
  vector of remainders. I could write that up in an internet draft if folks
  think it makes sense. That would be a more global procedure that didn't
  require a PKI and only addressed spoofed addresses. --

 here was my attempt at this, which i didn't really know where to go next with:







IndependentPaul Vixie (Ed.)
Request for Comments:  Category: Experimental
June 6, 2002

 Repudiating MAIL FROM

Status of this Memo

   This memo describes an experimental procedure for handling received
   e-mail.  It does not specify an Internet standard of any kind.
   Distribution of this memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2002).  All Rights Reserved.

Abstract

   At the time of this writing, more than half of all e-mail received by
   the author has a forged return address, due to the total absence of
   address authentication in SMTP (see [RFC2821]).  We present a simple
   and backward compatible method whereby cooperating e-mail senders and
   receivers can detect forged source/return addresses in e-mail.

1 - Introduction and Overview

1.1. Internet e-mail return addresses are nonrepudiable by design of the
relevant transport protocols (see [RFC2821]).  Simply put, there is no
cause for ANY confidence in the proposition this e-mail came from where
it says it came from.

1.2. Irresponsible actors who wish to transmit unwanted bulk e-mail
routinely use this designed-in lack of source/return authenticity to
hide their point of origin, which usually involves forging a valid
return address belonging to some highly visible and popular ISP (for
example, HOTMAIL.COM).

1.3. Recipients who wish to reject unwanted bulk e-mail containing
forged source/return addresses are prevented from doing so since the
addresses, as presented, are nonrepudiable by design.  Simply put, there
would be too many false positives, and too much valid e-mail rejected,
if one were to program an e-mail relay to reject all e-mail claiming to
be from HOTMAIL.COM since, statistically, most e-mail claiming to be
from HOTMAIL.COM is actually from somewhere else.  HOTMAIL.COM, in this
example, is a victim of forgery.



Vixie Experimental  [Page 1]

RFC   Repudiating MAIL FROM May 26, 2002


1.4. What's needed is a way to guaranty that each received e-mail
message did in fact come from some mail server 

RE: namedroppers, continued

2002-12-09 Thread Ketil Froyn
On Fri, 6 Dec 2002, Ayyasamy, Senthilkumarwrote:

 If the proof of effort requires, say, 10 seconds to compute, then the
 economics of sending spam are radically altered, as a single machine
 can send only 8,000 messages per day.

Wouldn't something like this cause problems for (large/free) email
providers?  They would probably need a lot of extra hardware to do all
this computation. And until something like this is included in the
standard, the receiver must accept mail from senders that don't implement
this yet.

I personally like the idea behind qconfirm (http://smarden.org/qconfirm/)
and TMDA (http://tmda.net/). If I receive an email that I do not recognize
or otherwise find to be authentic, a mail is sent back to the sender,
requesting that they send a verification mail to a unique secret address.
When a mail is received at this secret address, the original mail is
delivered to me, and the secret address is removed. For a spammer, it is
too expensive to receive and reply to all these mails.

Ketil




Re: namedroppers, continued

2002-12-09 Thread Dean Anderson
To make them do all the work, and you do little to verify, you need a lot
of things done independently, so that a random sample can be selected that
is much smaller than the work they had to do. This will get bulky.  The
less they send, the larger the fraction of work you have to do in relation
to theirs.  And of course, you have to do the same amount of work on your
outgoing messages as they do.

The result is that it costs you much more than it costs the spammer.
(since you have to do the work for both sending and receiving, and the
spammer only has to do the work for sending.

This would not result in a reduction of spam, as a percent of total mail.
If everyone used this, it might (at best or worst) reduce the total mail
sent, since the billions of legitimate messages sent each day would
require significantly more work to send.

Further, it would open one up to a denial of service type attack where
garbage is sent, and you have to do the work to check the (invalid)
signature, thereby wasting your cpu resources.

Essentially, this shoots oneself in the foot. Or perhaps the CPU.

--Dean

On Sat, 7 Dec 2002, Steven M. Bellovin wrote:

 In message [EMAIL PROTECTED], Dean An
 derson writes:
 This seems clever, however, it will also take significant computational
 effort to verify the computational effort was actually done. Even if a
 class of functions are found that are easier to verify than to compute,
 they will no doubt still take up a significant fraction of time.

 In fact, that's the easy part.  You could demand that the sender
 compute 1,000,000 HMACs of the text, the envelope, the time of day, and
 a counter.  The verifier could check 100 randomly-chosen ones -- if any
 fail, there's a forgery.  (Well, you probably wouldn't want those
 values, since 1,000,000 HMACs would be a lot of data to transmit.  But
 you get the general idea.)

   --Steve Bellovin, http://www.research.att.com/~smb (me)
   http://www.wilyhacker.com (Firewalls book)



 --
 to unsubscribe send a message to [EMAIL PROTECTED] with
 the word 'unsubscribe' in a single line as the message text body.
 archive: http://ops.ietf.org/lists/namedroppers/





RE: namedroppers, continued

2002-12-09 Thread Dean Anderson
On Sun, 8 Dec 2002, Lloyd Wood wrote:
 Sender pays is good. The penny black stamp effectively introduced a
 flat-rate tax on sending letters, rather than a variable-rate tax on
 receiving them, effectively turning mail into a common good available
 to all society.

You assume this really means the spammer pays [more]. But that isn't the
case.  This is based on the myth that somehow the receiver pays the entire
cost of a spam message. This isn't true, and never was true. The sender is
already paying, whether they are spammer or mailing list operator, or
regular end user.  The fact is that email is so cheap that it costs almost
nothing per message to send and receive.  It gets cheaper every day, as
disks and bandwidth get cheaper and cheaper. The receiver doesn't pay any
more than the sender pays. Real commercial spam happens because the cost
of sending spam is less than the cost of sending letters or postcards.

If you artificially made email expensive, it would be expensive for list
operators and regular people as well. You mentioned a rate of one cent per
message.  That would not be enough to deter spam. A rate of ten cents per
message would still be cheaper than postal mail, and so spammers would
still exist.  Much non-commmercial spam is sent by KLEZ or Nimda viruses.
This sort of abuse would not be affected whatsoever.  Note that KLEZ
infections are already illegal.

Think how much it would cost to send out namedroppers, (and the entire
bulk of IETF standards related email) if each message to each recipient
cost, say $0.10.  Or even one cent per message per recipient.  This
proposal would essentially wipe out many if not most mailing list
operators, and most ISPs.

I made a proposal back in 1997 that would not eliminate spam, but would
keep it out of your mailbox. My proposal was rejected because radicals
demanded a complete ban on spam. In 1998, there was an opportunity to get
anti-spam legislation passed.  Unreasonable anti-spam radicals passed up
that opportunity when they insisted on unrealistic demands, and
exaggerated and factually wrong assertions about the cost of spam.  They
assumed they could shout down any opposition, as they shouted down more
reasonable proposals.  They were understandably and easily crushed by the
Direct Marketing Association (DMA).  You can still see my proposal at
http://www.av8.com/H.4581/better.html This proposal would have been
difficult for the DMA to challenge since they already accept these
restrictions on postal mail.  You have the radical anti-spam leadership to
thank for your spam, and the fact that you don't have a universal opt-out
list.

The anti-spam effort was for all practical purposes completely crushed
when Exactis successfully sued MAPS and demonstrated that blacklists are
subject to the Sherman Anti Trust Act and that blacklists weren't
protected by the First Amendment.  I told Vixie this would happen in 1997.
He assured me that anti-spammers could win by technical means. If it
wasn't clear that he was wrong in 1997, (and it seemed pretty obvious even
then), it is now painfully obvious that Vixie and the rest were very
wrong.

It is really time for new, reasonable, anti-spam leadership, not artifical
changes to the cost of email, or schemes to try to make sending mail more
expensive for the senders, and certainly not gyrations in the sending of
namedroppers.

Thanks to the ineptitude, lack of foresight, irrationality, and general
unreasonableness of the anti-spam leadership, spam is here to stay. It is
just a matter of degrees of how bad it will be.  I note there is some
legislation before the house and senate (HR 1017) on spam control, that
reportedly isn't opposed by the DMA. However, these only control
fraudulent spam.  HR 1017 proposes extensions of 18 USC 1030, which makes
it a fraudulent spam a crime, but the FBI probably won't bring charges for
small violations. There is no provision for a civil action.

Another bill (S.630) would require each spammer to maintain an opt-out
list.  You would have to contact each spammer, and have your email address
added to their list, one by one. There would be thousands of spammers to
contact.

Note that my proposal would had a single opt-out list (the Post Office
already maintains such a list for postal junk mail), and my proposal
probably could have been passed into law in 1998.

--Dean




RE: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Vach Kompella
Let's also let the VRRP WG decide on the fate of SIP WG documents, the CALSCH WG
decide on the fate of OSPF WG docs...  Let's particularly ignore the fact that
the folks closest to the issues have the most interest in getting the best
possible outcome.

You might not think that's a fair analogy, but it's really the constituents who
are most impacted by the decision, not the IETF as a whole.  I'm not sure why
the other IETF WGs or areas would as a whole care about SUBIP, except on
principle.  And it's not like they don't have a voice (this mailing list and
particularly the plenaries).

I think the request for comments might be targeted at a slightly larger audience
(other WGs in the Routing Area, Transport Area, Operations Area, perhaps) whose,
since not everyone subscribes to the spam abatement, er, ietf mailing list.

-Vach

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Joe
 Touch
 Sent: Monday, December 09, 2002 10:34 AM
 To: Scott Bradner
 Cc: [EMAIL PROTECTED]
 Subject: Re: a personal opinion on what to do about the sub-ip area


 Scott Bradner wrote:
  for what it's worth here is my personal opionion on what we should
  do in the question of the sub-ip area
 
  I think we should go with the status quo (with the IESG selecting two
  volunteers to manage the area next March)
 
  I do not think that we can make a reasoned decision to do otherwise in the
  next week.
 
  Before Atlanta I was of the opinion that moving the WGs into other areas
  was the right thing to do, not because of any particular event, but
  more because we had said this was a temporary area and it was getting
  to be a long temporary (but I suppose we should note that the last
  temporary area (ipng) lasted 4 years)  But the feedback we got in
  Atlanta has convinced me that this is not reason enough to make a change.

 I'll add that most of the attendees at this meeting in Atlanta were from
 the WGs themselves. It is unsurprising that the overwhelming position of
 that group is to maintain the status quo. Moving them is definitely seen
 as unwelcome change from within the groups themselves.

 It would be useful to hear from the community at large regarding this
 issue, rather than letting the group decide (essentially) for itself.

 FWIW, I have yet to see a substantive justification for the _creation_
 of a new area yet. I, and others, have pointed out that the 'status quo'
 here is to let the area dissolve on schedule.

 Joe








Re: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Joe Touch
Vach Kompella wrote:

Let's also let the VRRP WG decide on the fate of SIP WG documents, the CALSCH WG
decide on the fate of OSPF WG docs...  Let's particularly ignore the fact that
the folks closest to the issues have the most interest in getting the best
possible outcome.


We don't let WGs decide the fate of WG docs; the IESG and RFC editors do 
that. The WGs make their - sometimes myopic - decisions, and the IESG 
decides how to proceed for the community.

By closer analogy, we certainly don't let BOFs decide whether to be WGs 
themselves.

Joe




RE: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Vach Kompella
Here's my personal opinion.

I think we have two suck^H^H^H^Hvolunteers :-)

I think the area's WGs need ADs who have been close enough to keep the
continuity of relations with other standards bodies, the past work, etc.

Regarding whether there is a need for an area long-term, it would depend on how
we foresee the charter of each WG developing.

ccamp: no opinion, since I haven't been keeping pace
gsmp: their work is nearly done (according to my interpretation of Avri's
comments)
ipo: no opinion, since I haven't been keeping pace
mpls: long-term
ppvpn: possibly long-term
tewg: their work is nearly done too (from the tewg minutes posted by Jim Boyle)

We don't have visibility into the next year, so we should keep the area as is,
which would allow the greatest progress in those WGs that are close to done.  We
will also know better what to do with the remaining WGs.  If at that point,
there's still work to be done, but not enough long-term WGs to warrant an area,
I am perfectly happy to close the area, and move ccamp and mpls to RTG and ppvpn
to (TSV | RTG).

-Vach

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Scott
 Bradner
 Sent: Monday, December 09, 2002 8:28 AM
 To: [EMAIL PROTECTED]
 Subject: a personal opinion on what to do about the sub-ip area



 for what it's worth here is my personal opionion on what we should
 do in the question of the sub-ip area

 I think we should go with the status quo (with the IESG selecting two
 suck^H^H^H^Hvolunteers to manage the area next March)

 I do not think that we can make a reasoned decision to do otherwise in the
 next week.

 Before Atlanta I was of the opinion that moving the WGs into other areas
 was the right thing to do, not because of any particular event, but
 more because we had said this was a temporary area and it was getting
 to be a long temporary (but I suppose we should note that the last
 temporary area (ipng) lasted 4 years)  But the feedback we got in
 Atlanta has convinced me that this is not reason enough to make a change.

 temporary area (ipng) lasted 4 years)  But the feedback we got in
 Atlanta has convinced me that this is not reason enough to make a change.
 And any move at this time to move the WGs would be seen as a slap in
 the face of the quite strong (even if in a limited venue) opinion
 expressed in Atlanta.

 Right after Atlanta I was convinced that we should follow the consensus and
 ask the nomcom to find a AD but upon refection I'm not sure that is the
 right thing either - partially  because as Randy has pointed out, we do
 not have a clear mission statement for such an area but mostly because
 enough of the WGs are close enough to finishing up that we whould have a
 quite small area in 6 months to a year and an area with only 2 or 3
 working groups seems a bit of a waste.  But if there is a long-term
 future for sub-IP work in the IETF then aditional working groups may
 be in the offering.  We need the time to reflect on what that future
 should be.

 So I think we should continue as-is until:
 1/ the WGs which will finish soon finish
 2/ we (the IESG, IAB  ietf community) figure out what role
sub-ip should play in the IETF in the long term

 but it would be good to hear from more of you both to the IETF list and
 to the IESG directly

 Scott







Re: namedroppers, continued

2002-12-09 Thread Vernon Schryver
 From: Stephen Sprunk [EMAIL PROTECTED]

 ...
 The problem I've seen repeatedly, including in an off-list discussion I'm
 having about this topic, is people confusing authentication with
 authorization.
 ...

Yes, that's a good way of putting the problem, but only for those able
and willing to see the differences among authorization, authentication,
confidentiality, non-repudiation, and so forth.

It's sad that weak as dishwater authentication as authorization (and
everything else) snake oil sells so well, as witnessed by Verisign's
PKI and Microsoft's ActiveX.


   ...My fear is the only effective solution may turn out to
 be closed lists with permission grants, such as the IM services introduced
 to keep spammers out.  That will greatly reduce the utility of email.

That has already happened about as much as it is going to happen or
could happen, as witnessed by the IETF lists.  The variations in
effectiveness and mechanisms among the IETF lists are minor details.
The notion of limiting submissions to known authors was once very
controversial here, but it's now accepted as necessary and desirable.
I don't see any reduction in  utility as a result.

Individual mailboxes differ.  Because people value its utility, personal
addresses will continue to accept mail from strangers who might be
sending the same message to 100,000 others.  Various technical and
administrative defenses will limit spam.

Except for those few of us who are obsessed with spam, filters that
are sufficent and require little effort will be used.  Popular choices
will be what people can do for themselves such as private and DNS white-
and blacklists, SpamAssassin, Brightmail, Postinni, Cloudmark/Razor, and
the DCC.  (Do for themselves includes hiring a competent ISP.)  Filters
that require joint actions by the sender and receiver, including the
computing-cost and authenticating DNS RR proposals, will never be popular.
Because they won't be popular, installations that start to use them will
switch to sufficient equivalents such as simple white-listing.  Sufficient
existing protocols are never vulnerable to slightly better replacements.

Joint action is an enormous barrier.  It is a cost that is justified
only in special cases.  That is why we are not routinely using PGP or
S-MIME for our private mail.  That's also why I see many more SMTP-TLS
connections to my SMTP server than I expected (many including from
spammers), and why almost none of them are authenticated.  To use
SMTP-TLS you need only install and configure a current SMTP server.
To use authenticated SMTP-TLS, you must use PKI or exchange keys.


Vernon Schryver[EMAIL PROTECTED]




RE: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Fred Baker
At 11:15 AM 12/9/2002 -0800, Vach Kompella wrote:

Let's also let the VRRP WG decide on the fate of SIP WG documents, the 
CALSCH WG decide on the fate of OSPF WG docs...  Let's particularly ignore 
the fact that the folks closest to the issues have the most interest in 
getting the best possible outcome.

AFAIK, we're not discussing document status; we're discussing working 
groups and the area that contains them. The documents will be published. 
And by the way, what do you think a last call is? We *do* in fact ask 
folks to comment on drafts being published outside their immediate area of 
concern.

As presented, we are discussing six working groups (ccamp, gsmp, ipo, mpls, 
ppvpn, and tewg), down from an original nine if memory serves, and of which 
four are likely to complete their work and dissolve during the coming year 
anyway. So we're really talking about two working groups: ccamp and mpls. 
The comparison is to Transport (27 working groups, up from a year ago) or 
Security (17 working groups), and User Services (now closed, with both of 
its working groups).

If there were new working groups spawning here, one might be able to argue 
that there is work justifying asking one or two people to dedicate their 
time as area directors to managing the working groups. It seems to me that 
moving the two continuing-to-be-active working groups to an active home 
when the others close is just good-management-101. If we're going to keep 
the area open, there needs to be a solid justification for doing so, and 
it's not there. 



Reminder: Deadline for input on sub-ip discussion

2002-12-09 Thread Harald Tveit Alvestrand
All,

On Wed Dec 4th, we asked for input to help us decide on the future of
the SUB-IP Area. See our posting at

 http://www.ietf.org/mail-archive/ietf/Current/msg18370.html

We had a large majority of people at the SUBIP Area meeting in Atlanta
expressing that they want the area to be long(er) lived. This will be part
of our input.

But we need/want to hear from the IETF community. So please express
your opionion (and the reasoning behind it) asap on [EMAIL PROTECTED], but 
certainly before Thursday Dec 12th 10am US Eastern time.

As expressed in the above posting (with data points and discussion 
included),
the 3 choices for the SUB-IP Area seem to be:

 1/ move WGs (back) to permanent areas: migrate the SUB-IP
working groups to other IETF areas sometime soon, likely before next
summer and close the SUB-IP area. Also, reconstitute the SUB-IP (and/or
other) directorates to ensure the continued coordination between the
remaining WGs.

 2/ establish a long-term area: decide that the SUB-IP
area will be a long-term one, clearly define its charter, and ask the
nomcom to select one or two people to be Area Directors

 3/ status quo: continue the SUB-IP Area as a temporary,
ad-hoc effort, much as it has been, with the IESG selecting two sitting
ADs to continue the effort that Bert  Scott have been doing. But maybe
give more responsibility to the working group's technical advisors,
normally the AD from the area where the working group might otherwise
live.

The opinions expressed so far seem to show clearly that the community is 
divided on the issue, with perhaps some preference for the status quo 
(alternative 3).

If you have a strong preference for one (or two) of these, and have not yet 
said so, please indicate your opinion (and your reasons) by mail to 
[EMAIL PROTECTED] before Thursday.

Thank you!

 Harald Alvestrand, for the IESG

(please repost this message where appropriate)



RE: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Vach Kompella
You normally don't get to last call without having gotten the WG's opinion on
whether it should even go to the IESG.  I think the IESG expects that due
diligence from the WG.  It has been pointed out that the sub-ip area meeting had
an majority that wished the area to continue, at least for the time being.  I
don't want that to be ignored, or dismissed as just the choir's opinion.  The
general solicitation of input on the ietf mailing list (and, as I suggested in
my email, we should probably have included other RTG and TSV working groups -
not just those involved in SUB-IP related work), is like the last call.

I've aleady posted my personal opinion on where I think we should go with
sub-ip.  To clarify, in terms of the three options given, it's option 3 (status
quo).

I am of the opinion that if the target for 3 WGs (ipo, tewg, gsmp) is to close
soon, then keeping the area (with the same ADs) open temporarily long enough for
the continuity needed to bring stuff to closure is also good management-101.
I'm not very bullish on ppvpn closing on schedule.

I don't think ccamp and mpls will close that soon.  So, I would expect that
these two would go into RTG and ppvpn (because of its affinity to pwe3) would go
into TSV, but perhaps it may end up in RTG.

-Vach

 -Original Message-
 From: Fred Baker [mailto:[EMAIL PROTECTED]]
 Sent: Monday, December 09, 2002 12:31 PM
 To: [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]
 Subject: RE: a personal opinion on what to do about the sub-ip area


 At 11:15 AM 12/9/2002 -0800, Vach Kompella wrote:
 Let's also let the VRRP WG decide on the fate of SIP WG documents, the
 CALSCH WG decide on the fate of OSPF WG docs...  Let's particularly ignore
 the fact that the folks closest to the issues have the most interest in
 getting the best possible outcome.

 AFAIK, we're not discussing document status; we're discussing working
 groups and the area that contains them. The documents will be published.
 And by the way, what do you think a last call is? We *do* in fact ask
 folks to comment on drafts being published outside their immediate area of
 concern.

 As presented, we are discussing six working groups (ccamp, gsmp, ipo, mpls,
 ppvpn, and tewg), down from an original nine if memory serves, and of which
 four are likely to complete their work and dissolve during the coming year
 anyway. So we're really talking about two working groups: ccamp and mpls.
 The comparison is to Transport (27 working groups, up from a year ago) or
 Security (17 working groups), and User Services (now closed, with both of
 its working groups).

 If there were new working groups spawning here, one might be able to argue
 that there is work justifying asking one or two people to dedicate their
 time as area directors to managing the working groups. It seems to me that
 moving the two continuing-to-be-active working groups to an active home
 when the others close is just good-management-101. If we're going to keep
 the area open, there needs to be a solid justification for doing so, and
 it's not there.






Re: Reminder: Deadline for input on sub-ip discussion

2002-12-09 Thread Scott W Brim
On Mon, Dec 09, 2002 10:21:59PM +0100, Harald Tveit Alvestrand allegedly wrote:
 The opinions expressed so far seem to show clearly that the community is 
 divided on the issue, with perhaps some preference for the status quo 
 (alternative 3).

That means to me you should just leave it alone for now.  Are they
destroying the IETF's reputation?  Creating designs which make other
areas' work impossible?  If in fact half the working groups in the area
are about to finish, let them do so.  This particular problem is one
that's getting better, not worse.  We have other things that are more
urgent.

..Scott




Re: namedroppers, continued

2002-12-09 Thread Valdis . Kletnieks
On Mon, 09 Dec 2002 11:52:26 CST, Stephen Sprunk [EMAIL PROTECTED]  said:

 The problem I've seen repeatedly, including in an off-list discussion I'm
 having about this topic, is people confusing authentication with
 authorization.

Authentication:  Yes, you seem to be Jeffrey Dahlmer.
Authorization:   You say you'd like to borrow a steak knife?

Usually clears up the confusion in all but the most sluggish mind.. ;)

However, authorization usually implies authentication beforehand.
Does anybody  have a reference on an authorization scheme that
doesn't imply any authentication?
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg09712/pgp0.pgp
Description: PGP signature


RE: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Fred Baker
At 01:38 PM 12/9/2002 -0800, Vach Kompella wrote:

It has been pointed out that the sub-ip area meeting had an majority that 
wished the area to continue, at least for the time being.  I don't want 
that to be ignored, or dismissed as just the choir's opinion.

I don't believe it is being ignored. It is in fact a large part of the 
reason the ADs are asking this question, and BTW the fact that they asked 
the area folks the question shows an open-ness of mind. They take a lot of 
!@#$%^ from the community, I wish the community would notice when they do 
something well, and speak as loudly about it.

But I should hope that not only would the wishes of the folks in the area 
be looked at, but the wear and tear on the ADs, and the management 
principles that apply. It has to be a sensible decision on all counts, not 
just the presently-popular one.

I've aleady posted my personal opinion on where I think we should go with
sub-ip.  To clarify, in terms of the three options given, it's option 3 
(status
quo).

which is to say, wait until the work winds down, and then close the 
temporary area. I'm glad we agree on that; from your last email, it sounded 
like we didn't. If you go back and read both emails that I have posted to 
this list, I have said as much, and I think that's pretty much what Scott 
said he came down to in the end. 



Re: namedroppers, continued

2002-12-09 Thread Stephen Sprunk
Thus spake [EMAIL PROTECTED]
 Authentication:  Yes, you seem to be Jeffrey Dahlmer.
 Authorization:   You say you'd like to borrow a steak knife?

 Usually clears up the confusion in all but the most sluggish mind.. ;)

That's a very clear example, thanks.

 However, authorization usually implies authentication beforehand.
 Does anybody  have a reference on an authorization scheme that
 doesn't imply any authentication?

In a sense:  the IETF lists (and most others) use a null authentication
method, i.e. you trust whatever is in the message.  After that (null) step,
we apply weak authorization, i.e. whether the sender is on the approved
list.

I've seen lots of proposals to improve the former-- hardly difficult -- but
none for the latter.  Perhaps using precise terminology will help focus
efforts in the right area.

S




Re: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Keith Moore
 Let's particularly ignore the fact that
 the folks closest to the issues have the most interest in getting the best
 possible outcome.

increasingly often I find WGs whose definition of the best possible
outcome is inconsistent with, and in some cases almost diametrically
opposed to, the interests of the larger community. 

Keith




Re: namedroppers, continued

2002-12-09 Thread Edward Lewis
At 16:53 -0500 12/9/02, [EMAIL PROTECTED] wrote:

However, authorization usually implies authentication beforehand.
Does anybody  have a reference on an authorization scheme that
doesn't imply any authentication?


World readable files.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis  +1-703-227-9854
ARIN Research Engineer




Re: Reminder: Deadline for input on sub-ip discussion

2002-12-09 Thread Joe Touch
I'm in favor of 1/

3/, again, seems contradictory. The status quo is that it disappears. 
Continuing it without a fixed end date is to subversively result in 2/ 
without a clear charter definition and Nomcom participation.

To be specific, I don't think 3/ should be on the table, at least not 
without a finite extension limit. However, what do we expect to change 
in the next N months? Will all the current groups complete their 
mission? Will no new groups want to be in this area? If we can't stick 
to a deadline now, what makes us think we can stick to one in N months?

Joe

 1/ move WGs (back) to permanent areas: migrate the SUB-IP
working groups to other IETF areas sometime soon, likely before next
summer and close the SUB-IP area. Also, reconstitute the SUB-IP (and/or
other) directorates to ensure the continued coordination between the
remaining WGs.

 2/ establish a long-term area: decide that the SUB-IP
area will be a long-term one, clearly define its charter, and ask the
nomcom to select one or two people to be Area Directors

 3/ status quo: continue the SUB-IP Area as a temporary,
ad-hoc effort, much as it has been, with the IESG selecting two sitting
ADs to continue the effort that Bert  Scott have been doing. But maybe
give more responsibility to the working group's technical advisors,
normally the AD from the area where the working group might otherwise
live.






Sub-IP: A lurker's view, choose Option 1

2002-12-09 Thread grenville armitage

I haven't been involved in, or even particularly tracking, Sub-IP
efforts since the start of 2001. That makes me either irrelevant or
independent, your choice.  I was lurking around some of the Sub-IP
topics prior to November 2000, so my perspective is probably past
its 'best before' date. Nevertheless...

I suggest Sub-IP needs to fold/fade as per its original goals, and
the remaining WGs moved to regular Areas.  If a good argument can
later be made for re-constituting a Sub-IP (or similar) area, then
let that argument be made from scratch.

I think that maps most closely Harald's Option 1 (I'd pick Option 3
if it explicitly clarified that no new WGs could be added to Sub-IP,
but without the protection of such a clause I have to pick Option 1).

Why? A couple of thoughts.

 - This discussion isn't about whether the related work itself is valuable.
   It is about the utility of an entire Area dedicated to Sub-IP.
   Different things.

 - A thought: IP networking involves routing, transport, e2e ('internet'),
   and security issues (at least), and the IETF has Areas to deal with each. 
   In 2000 it was broadly observed that some subnetwork technologies were
   absorbing IP-ish protocols and methods (e.g. MPLS and derivatives)
   and that other virtual network technologies were being built over/around/inside
   existing IP networks. Despite the fact that each of these work areas have
   routing, transport, and security implications we somehow decided it could
   all be handled by a single, Sub-IP Area. This has all the halmarks of a
   short-term until we can figure out where to properly put them solution.
   The short-term is over, now assign the work out into the appropriate routing,
   transport, internet, or security areas.

 - I'm not convinced by arguments of Sub-IP participants that their
   Area must go on (or grow on). I've been immersed enough in WG work
   before to know the temptation of self-importance. Having one's own
   area would be pretty important. But I'm not convinced these WGs
   are best served by being supported outside the other IETF areas.
   (And see point 1 above that this isn't a debate about the value, per se,
of the work being done in Sub-IP)

cheers,
gja
-- 
Grenville Armitage
http://caia.swin.edu.au




Re: namedroppers, continued

2002-12-09 Thread Bill Cunningham
I haven't personally tried myself to opt out. But I've read they have the
form. If they told you they don't have a form to sort out junk mail for you
I'd say they were full out it. I'd call the Postmaster General's office.

- Original Message -
From: Stephen Sprunk [EMAIL PROTECTED]
To: Bill Cunningham [EMAIL PROTECTED]
Sent: Monday, December 09, 2002 12:56 PM
Subject: Re: namedroppers, continued


 Can you tell me where to get this form?  When I spoke to the USPS, they
said
 they're legally obligated to deliver all junk mail addressed to me,
 regardless of whether I want it.

 Now, the DMA (not the USPS) does have an opt-out list you can join, but
 unfortunately that only drops about half the junk mail I get -- many local
 mailers don't join the DMA because of cost.

 S


 Bill Cunningham wrote:
  How about passing a law that makes eveyone install a BIOS patch to
  block out spam. ;-)
 
  On the serious side Vernon has a point. Even with snail mail you
  can go to the post office and the USPS will provide you with a form
  to fill out and they will not put advertisements into your mail. If
  ISPs would only do the same. As of yet, if all else fails, deleting a
  email box is easier and more effective than taking a ballbat to a
  snail mail box.
 
  --Bill
  - Original Message -
  From: Vernon Schryver [EMAIL PROTECTED]
  To: [EMAIL PROTECTED]
  Sent: Monday, December 09, 2002 12:09 AM
  Subject: Re: namedroppers, continued
 
 
  From: [EMAIL PROTECTED]
 
  ...
  The bootstrap problem will exist no matter what scheme we decide on.
 
  There are many spam solutions that do not have the bootstrapping
  problem.  Examples include effective laws and honest intent and
  action by ISPs.  Before saying those are hopeless, please note that
  the many bootstrap-limited proposals don't have proven prospects.
 
  The point I was addressing was that there's been two major classes
  of scheme proposed ...
 
  However, the partitions created by each scheme are quite
  complementary, ...
 
  Your observation of how those two solutions fit together is
  interesting...or would be if they did not suffer from other problems.
 
 
  ...
  Moore's law causes a bunch of problems for the computing idea. ...
 
  It may not be as big of a problem as we think.  Rough
  back-of-envelope calculations now:  Let's say we assume a function
  X designed to take 10 seconds of CPU on my laptop (which has a
  1.6Gz P-4 in it) to limit it to 8K messages/day.
 
  http://www.intel.com/home/desktop/pentium4/ suggests state of the
  commodity art is about twice that, which lets a spammer send 16K
  msgs/day. Moore's law is still a treadmill that you don't want to
  fight.
 
Now, this same function will take around 2 minutes on
  a 133mz processor and be restricted to 800 mails/day. ...
 
  I would put the lower limit at around 48 MHz on 80486s, or ~8 times
  slower than a 133 MHz Pentium.  Such machines go back less than 10
  years. Would you expect your conservative correspondents to spend 15
  minutes to send you a message, or would you just white-list them?
  Once you start white-listing, it's hard to have much enthusiasm for
  more fancier solutions.
 
 
  Now how many people are still using a 133 system to do that much
  outbound mail themselves (and *NOT* just relaying all outbound mail
  to a smarthost)?
 
  I think recent FreeBSD and sendmail would still work fine at 48 MHz,
  although you probably want to stuff the thing to the gills with 64
  MByte of RAM, or more if it can take it.  There are many computing
  tasks that don't need 3 GHZ and 3 GByte.
 
  Aren't busy smarthosts significantly busier than 80K msgs/day?
  From my old experience, that was true even when they were running
  at less than 50 MHz and with perhaps 100 MByte.
 
  Besides, no matter what inmates of glass houses and big ISPs would
  have you think, SMTP is a peer-to-peer protocol.  A major damage spam
  is doing is helping government commissars and ISP salescritters
  convince people that the ancient Compuserve/AOL/Prodigy/whatever
  dumb-terminal- connected-to-central-servers is the only way to do
  public networking and computing.
 
 
  And
  even *MORE* to the point, what are the chances that a system that
  old will be upgraded software-wise to support a scheme, even if it
  takes zero additional CPU? ...
 
  Would you whitelist it for the next 10 years?  If there are very
  few, white-listing works.  If not, you've got that bootstrapping
  problem, and you've invited the white-listing camel into your tent.
 
 
  Vernon Schryver[EMAIL PROTECTED]

  |  | Stephen Sprunk, K5SSS, CCIE #3723
 :|::|:Network Design Consultant
:|||:  :|||:   Cisco Advanced Services
 .:|||:..:|||:.Richardson, Texas, USA





RE: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Gray, Eric
THE PRESENT SET OF AREA DIRECTORS ARE DOING A GREAT JOB.
THIS IS A CONTINUATION OF A LONG STANDING TREND.

(Is that better, Fred?)

I support option 3).  I also suspect that this is not a
case of ignoring the consensus of those attending the
meeting.  Some people may feel that the best way for the
ADs involved to find relief from their awesome burdens
was to create a new directorship.  If that doesn't make
sense from their perspective, then why do it?

Eric W. Gray
Systems Architect
Celox Networks, Inc.
[EMAIL PROTECTED]
508 305 7214


 -Original Message-
 From: Fred Baker [mailto:[EMAIL PROTECTED]]
 Sent: Monday, December 09, 2002 4:54 PM
 To: [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]
 Subject: RE: a personal opinion on what to do about the sub-ip area
 
 At 01:38 PM 12/9/2002 -0800, Vach Kompella wrote:
 It has been pointed out that the sub-ip area meeting had an majority that
 wished the area to continue, at least for the time being.  I don't want
 that to be ignored, or dismissed as just the choir's opinion.
 
 I don't believe it is being ignored. It is in fact a large part of the
 reason the ADs are asking this question, and BTW the fact that they asked
 the area folks the question shows an open-ness of mind. They take a lot of
 !@#$%^ from the community, I wish the community would notice when they do
 something well, and speak as loudly about it.
 
 But I should hope that not only would the wishes of the folks in the area
 be looked at, but the wear and tear on the ADs, and the management
 principles that apply. It has to be a sensible decision on all counts, not
 just the presently-popular one.
 
 I've aleady posted my personal opinion on where I think we should go with
 sub-ip.  To clarify, in terms of the three options given, it's option 3
 (status
 quo).
 
 which is to say, wait until the work winds down, and then close the
 temporary area. I'm glad we agree on that; from your last email, it
 sounded
 like we didn't. If you go back and read both emails that I have posted to
 this list, I have said as much, and I think that's pretty much what Scott
 said he came down to in the end.




Re: namedroppers, continued

2002-12-09 Thread Matt Crawford
 Does anybody  have a reference on an authorization scheme that
 doesn't imply any authentication?

You will deliver the satchel to the one who presents the matching
half of this hundred-euro note.




Re: namedroppers, continued

2002-12-09 Thread Valdis . Kletnieks
On Mon, 09 Dec 2002 17:47:58 EST, Edward Lewis said:

 Does anybody  have a reference on an authorization scheme that
 doesn't imply any authentication?
 
 World readable files.

We know how to do that already ;)

I was thinking more along the lines of a zero-knowledge proof or
something like that - a scheme where you can prove you're authorized to
do something(*) without having to prove who you are first.

(*) and explicitly ruling out the 'null check, everybody is allowed' case ;)

/Valdis




msg09723/pgp0.pgp
Description: PGP signature


Re: Reminder: Deadline for input on sub-ip discussion

2002-12-09 Thread Loa Andersson


Harald Tveit Alvestrand wrote:

All,

 snip 

If you have a strong preference for one (or two) of these, and have not 
yet said so, please indicate your opinion (and your reasons) by mail to 
[EMAIL PROTECTED] before Thursday.

my preferences are 2 or 3, so far i've not seen any other argument for 1
other than it was decided 2 years ago, if we really want the 3 of the
wg's to finish let them do so with re-org

i strongly doubt that ccamp, mpls and ppvpn are candidates for closing
down in 6 months

it seems like the arguments by keith, fred and joe are good arguments
for that these wg's need a focus of their own

if you believ that they are doing harm, that is not reason to re-org,
closing down would be called for

if you believe they are doing good, let them continue to do so

in neither case shuffle groups around helps

i can live with status quo

/Loa

--
Loa Andersson

Mobile  +46 739 81 21 64
Email   [EMAIL PROTECTED]





Re: namedroppers, continued

2002-12-09 Thread John C Klensin


--On Monday, 09 December, 2002 16:17 -0600 Stephen Sprunk
[EMAIL PROTECTED] wrote:

 Thus spake [EMAIL PROTECTED]
 Authentication:  Yes, you seem to be Jeffrey Dahlmer.
 Authorization:   You say you'd like to borrow a steak knife?
 
 Usually clears up the confusion in all but the most sluggish
 mind.. ;)
 
 That's a very clear example, thanks.
 
 However, authorization usually implies authentication
 beforehand. Does anybody  have a reference on an
 authorization scheme that doesn't imply any authentication?
 
 In a sense:  the IETF lists (and most others) use a null
 authentication method, i.e. you trust whatever is in the
 message.  After that (null) step, we apply weak authorization,
 i.e. whether the sender is on the approved list.

Actually, it is a very common situation:

Think about almost any case in which possession of a token
authorizes one to do something, but no identification/
authentication is implied.  For what is perhaps one of the older
examples, can you go to a store where you are not known, in some
part of your country where you are not frequently present, and
buy something.  Of course you can: you pass an authorization
token, typically called cash across the counter and get some
merchandise in return.  The quantity of tokens you possess and
their value even determines the extent of your authorization.

Credit card companies often draw an analogy to that situation,
which is one of the reasons they have stayed far out of the
_public_ part of the PKI business: they don't really care who
you are, or who uses the credit card, as long as the bill gets
paid.  Anything they do or require that involves authentication
has to do with the the bill will get paid without protest
property, not your identity.

 john




Re: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Alex Zinin

FWIW, I support Scott's suggestion. We went somewhat different paths,
but finally came to the same conclusion. I'm personally skeptical at
this moment about SUB-IP becoming a permanent area (area overlaps,
mission statement, expected number of WGs, etc.), but we did hear in
Atlanta a strong message from the SUB-IP community against closing the
area at this time. IMO our best shot now is to continue as is, and
revisit the question in a year or when the situation with about-to-
conclude WGs clarifies.

Alex

Monday, December 09, 2002, 8:27:43 AM, Scott Bradner wrote:
 for what it's worth here is my personal opionion on what we should
 do in the question of the sub-ip area

 I think we should go with the status quo (with the IESG selecting two
 suck^H^H^H^Hvolunteers to manage the area next March)

 I do not think that we can make a reasoned decision to do otherwise in the
 next week.

 Before Atlanta I was of the opinion that moving the WGs into other areas
 was the right thing to do, not because of any particular event, but
 more because we had said this was a temporary area and it was getting
 to be a long temporary (but I suppose we should note that the last
 temporary area (ipng) lasted 4 years)  But the feedback we got in
 Atlanta has convinced me that this is not reason enough to make a change.

 temporary area (ipng) lasted 4 years)  But the feedback we got in
 Atlanta has convinced me that this is not reason enough to make a change.
 And any move at this time to move the WGs would be seen as a slap in
 the face of the quite strong (even if in a limited venue) opinion
 expressed in Atlanta.

 Right after Atlanta I was convinced that we should follow the consensus and
 ask the nomcom to find a AD but upon refection I'm not sure that is the
 right thing either - partially  because as Randy has pointed out, we do
 not have a clear mission statement for such an area but mostly because
 enough of the WGs are close enough to finishing up that we whould have a
 quite small area in 6 months to a year and an area with only 2 or 3  
 working groups seems a bit of a waste.  But if there is a long-term
 future for sub-IP work in the IETF then aditional working groups may
 be in the offering.  We need the time to reflect on what that future  
 should be.

 So I think we should continue as-is until:
 1/ the WGs which will finish soon finish
 2/ we (the IESG, IAB  ietf community) figure out what role  
sub-ip should play in the IETF in the long term

 but it would be good to hear from more of you both to the IETF list and
 to the IESG directly

 Scott





Re: namedroppers, continued

2002-12-09 Thread Ofer Inbar
[EMAIL PROTECTED] wrote:
 Does anybody  have a reference on an authorization scheme that
 doesn't imply any authentication?

From:-line based email filters.

  --  Cos (Ofer Inbar)  --  [EMAIL PROTECTED] http://cos.polyamory.org/
  --  WBRS (100.1 FM)   --  [EMAIL PROTECTED] http://www.wbrs.org/
   OSI is a beautiful dream, and TCP/IP is living it!
 -- Einar Stefferud [EMAIL PROTECTED], IETF mailing list, 12 May 1992




Re: Reminder: Deadline for input on sub-ip discussion

2002-12-09 Thread Michael Richardson
-BEGIN PGP SIGNED MESSAGE-


 Harald == Harald Tveit Alvestrand [EMAIL PROTECTED] writes:
Harald   2/ establish a long-term area: decide that the SUB-IP
Harald  area will be a long-term one, clearly define its charter, and ask the
Harald  nomcom to select one or two people to be Area Directors

Harald   3/ status quo: continue the SUB-IP Area as a temporary,
Harald  ad-hoc effort, much as it has been, with the IESG selecting two 
sitting
Harald  ADs to continue the effort that Bert  Scott have been doing. But 
maybe
Harald  give more responsibility to the working group's technical advisors,
Harald  normally the AD from the area where the working group might otherwise
Harald  live.

  I prefer #3 for the next year.

  However, I would prefer that we change:

IESG selecting two sitting ADs to continue 
to
IESG selecting two people as ADs

  
  That is, the IESG could select people who aren't currently sitting ADs. (or
they can select sitting ADs)

]   ON HUMILITY: to err is human. To moo, bovine.   |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[
] [EMAIL PROTECTED] http://www.sandelman.ottawa.on.ca/ |device driver[
] panic(Just another Debian GNU/Linux using, kernel hacking, security guy); [



  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Finger me for keys

iQCVAwUBPfUnDoqHRg3pndX9AQEghQQA57ZhokVCkMDIt8Xix4yu1tjCQEb9JmcD
ksrpBr60p3dN5TKnGiHn+qPX6cX0J1PSiiPckkLjN6x1HiKDScxEFncOIeWhx9L0
Zo6dDQIP64Abg4OsF3qiKEOgr5t5QOoMyr1By7f6Q97/iF8KzPQznLmASm+diipd
Oy7Y08BefpU=
=UHO4
-END PGP SIGNATURE-




Re: namedroppers, continued

2002-12-09 Thread Dave Crocker
Stephen,


Monday, December 9, 2002, 9:52:26 AM, you wrote:
Stephen The devil is in determining what senders are authorized once we've
Stephen authenticated them.

The concept of being authorized to send someone mail has good logic, but
goes against established human communication practises for mail and
telephone.  (Filtering is common to both, but is different from
authorization.)

Some time ago, Mike O'Dell put forward the idea of accountable, in the
sense of being able to reach back to the sender, to hold them accountable
for their actions.

The general idea behind pursuing simple authentication presumes that the
really nasty spammers would not want to be identified.  It's not clear how
valid this presumption really would be.

d/
-- 
 Dave Crocker  mailto:[EMAIL PROTECTED]
 TribalWise http://www.tribalwise.com
 t +1.408.246.8253; f +1.408.850.1850




RE: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Tony Hain
My question is, what harm will be done to the WG's ability to deliver
and close by moving them? If there were are real need for cross group
coordination within the sub-IP area, that would be a little clearer.
Instead we have a situation where these groups need to coordinate with a
real area to accomplish their work, but feel they need dedicated area
directors to do that. 

The only reason I can see that this would make any difference is if the
AD's in the natural home area were particularly critical of the work. If
that were the case, it would be difficult to coordinate with that area
as the charter requires, so I can't see that it really matters in the
long run. The only real gain here is the ability to run along under the
'natural home' AD's radar until the IESG gets the doc. That could be
good because it allows the group to bake the ideas before being
criticized, but it could also be bad because it makes the whole IESG
look like the bad guys when a doc is rejected after WG last call. 

If the groups are really expected to close within a year anyway, they
must be sufficiently far along that a change in management will not
derail their efforts. If that is not the case, how would they survive if
sub-IP were a standing area and the nomcom decided to change the AD? 

In any case, I believe the burden of proof needs to be on those who want
the area continued as to why close coordination between the WGs is a
more expedient approach to task completion than simply putting them back
in their natural homes.

Tony


 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On 
 Behalf Of Alex Zinin
 Sent: Monday, December 09, 2002 3:17 PM
 To: Scott Bradner
 Cc: [EMAIL PROTECTED]
 Subject: Re: a personal opinion on what to do about the sub-ip area
 
 
 
 FWIW, I support Scott's suggestion. We went somewhat 
 different paths, but finally came to the same conclusion. I'm 
 personally skeptical at this moment about SUB-IP becoming a 
 permanent area (area overlaps, mission statement, expected 
 number of WGs, etc.), but we did hear in Atlanta a strong 
 message from the SUB-IP community against closing the area at 
 this time. IMO our best shot now is to continue as is, and 
 revisit the question in a year or when the situation with 
 about-to- conclude WGs clarifies.
 
 Alex
 
 Monday, December 09, 2002, 8:27:43 AM, Scott Bradner wrote:
  for what it's worth here is my personal opionion on what we 
 should do 
  in the question of the sub-ip area
 
  I think we should go with the status quo (with the IESG 
 selecting two 
  suck^H^H^H^Hvolunteers to manage the area next March)
 
  I do not think that we can make a reasoned decision to do 
 otherwise in 
  the next week.
 
  Before Atlanta I was of the opinion that moving the WGs into other 
  areas was the right thing to do, not because of any 
 particular event, 
  but more because we had said this was a temporary area and it was 
  getting to be a long temporary (but I suppose we should 
 note that the 
  last temporary area (ipng) lasted 4 years)  But the 
 feedback we got in 
  Atlanta has convinced me that this is not reason enough to make a 
  change.
 
  temporary area (ipng) lasted 4 years)  But the feedback we got in 
  Atlanta has convinced me that this is not reason enough to make a 
  change. And any move at this time to move the WGs would be 
 seen as a 
  slap in the face of the quite strong (even if in a limited venue) 
  opinion expressed in Atlanta.
 
  Right after Atlanta I was convinced that we should follow the 
  consensus and ask the nomcom to find a AD but upon 
 refection I'm not 
  sure that is the right thing either - partially  because as 
 Randy has 
  pointed out, we do not have a clear mission statement for 
 such an area 
  but mostly because enough of the WGs are close enough to 
 finishing up 
  that we whould have a quite small area in 6 months to a 
 year and an area with only 2 or 3
  working groups seems a bit of a waste.  But if there is a long-term
  future for sub-IP work in the IETF then aditional working groups may
  be in the offering.  We need the time to reflect on what 
 that future  
  should be.
 
  So I think we should continue as-is until:
  1/ the WGs which will finish soon finish
  2/ we (the IESG, IAB  ietf community) figure out 
 what role  
 sub-ip should play in the IETF in the long term
 
  but it would be good to hear from more of you both to the IETF list 
  and to the IESG directly
 
  Scott
 
 




RE: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Vach Kompella
And is that because members of the larger community were not allowed to
participate in those WGs whose decisions adversely impacted their interests?
Because, by your assertion, if they had participated, they would have been part
of making the WG decision, which would therefore not have been in the interest
of that remaining larger community :-)

-Vach

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
 Sent: Monday, December 09, 2002 11:55 AM
 To: [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]
 Subject: Re: a personal opinion on what to do about the sub-ip area


  Let's particularly ignore the fact that
  the folks closest to the issues have the most interest in getting the best
  possible outcome.

 increasingly often I find WGs whose definition of the best possible
 outcome is inconsistent with, and in some cases almost diametrically
 opposed to, the interests of the larger community.

 Keith






Re: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Eliot Lear


increasingly often I find WGs whose definition of the best possible
outcome is inconsistent with, and in some cases almost diametrically
opposed to, the interests of the larger community. 

I have two problems with this statement.  First, while I am all for 
being critical of our processes for the purposes of improving them, we 
as a group should avoid making these sorts of generalizations.  Say what 
you will about Dan Bernstein.  At least his complaints are specific and 
backed up.

Second, I believe the complaints that are alluded to have been raised 
again and again and again.  Can we as a community learn to agree to 
disagree on points of architecture, once decisions have been made?

Eliot



Re: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Eric Rosen

 The  workings  of  special  interest  groups  can  and  often  do  have  a
 significant effect  on the general  population, but nobody can  afford the
 time and  energy it takes  to keep track  of every special  interest group
 that might affect him.

Often  it  seems as  though  the  WGs reflect  the  broad  consensus of  the
community, and the IESG is the special interest group.




Re: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Keith Moore
  increasingly often I find WGs whose definition of the best possible
  outcome is inconsistent with, and in some cases almost diametrically
  opposed to, the interests of the larger community.
 
 I have two problems with this statement.  First, while I am all for
 being critical of our processes for the purposes of improving them, we
 as a group should avoid making these sorts of generalizations.  Say what
 you will about Dan Bernstein.  At least his complaints are specific and
 backed up.

Sometimes it's better to be imprecise than to point fingers and name names.
However I am seriously considering pointing fingers and naming names.

 Second, I believe the complaints that are alluded to have been raised
 again and again and again.  Can we as a community learn to agree to
 disagree on points of architecture, once decisions have been made?

Oh, you're talking about *that* group.  I had almost forgotten about them.

Keith




Re: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Keith Moore
  The  workings  of  special  interest  groups  can  and  often  do  have  a
  significant effect  on the general  population, but nobody can  afford the
  time and  energy it takes  to keep track  of every special  interest group
  that might affect him.
 
 Often  it  seems as  though  the  WGs reflect  the  broad  consensus of  the
 community, and the IESG is the special interest group.

In my experience, IESG has tremendous breadth - considerably exceeding that 
of any single WG.

Keith 




Re: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread grenville armitage

Eric Rosen wrote:
[..]
 Often  it  seems as  though  the  WGs reflect  the  broad  consensus of  the
 community, and the IESG is the special interest group.

Given that the IETF *is* a special interest group, I take this as a feature
rather than a bug.

cheers,
gja




Re: Reminder: Deadline for input on sub-ip discussion

2002-12-09 Thread Yu-Shun Wang
Michael Richardson wrote:


-BEGIN PGP SIGNED MESSAGE-



Harald == Harald Tveit Alvestrand  writes:

Harald   2/ establish a long-term area: decide that the SUB-IP
Harald  area will be a long-term one, clearly define its charter, and 
ask the
Harald  nomcom to select one or two people to be Area Directors

Harald   3/ status quo: continue the SUB-IP Area as a temporary,
Harald  ad-hoc effort, much as it has been, with the IESG selecting 
two sitting
Harald  ADs to continue the effort that Bert  Scott have been doing. 
But maybe
Harald  give more responsibility to the working group's technical 
advisors,
Harald  normally the AD from the area where the working group might 
otherwise
Harald  live.

  I prefer #3 for the next year.

The problem with #3 is that there is no timeline of any sort in this option.

While option #1 (quoted below) sounds severe, it does not close all the door
for Sub-IP. It just forces IETF as a community to rethink whether those
remaining wgs (or anything else people come up with then) belong to IETF or not,
and if they do, where. I believe this was why the Sub-IP area was marked
temporary when it was created; to force us to re-examine the issues now.


 1/ move WGs (back) to permanent areas: migrate the SUB-IP
working groups to other IETF areas sometime soon, likely before next
summer and close the SUB-IP area. Also, reconstitute the SUB-IP (and/or
other) directorates to ensure the continued coordination between the
remaining WGs. 


Status quo (#3) merely delays this discussion indefinitely because of the
lack of a timeline and, as Grenville pointed out in his email, no protection
against adding new wgs into Sub-IP area.

I prefer option #1, and if there are reasons IETF should have a Sub-IP
area, they should be argued assuming the area is closed.

yushun.




  However, I would prefer that we change:

	IESG selecting two sitting ADs to continue
to
	IESG selecting two people as ADs


  That is, the IESG could select people who aren't currently sitting ADs. (or
they can select sitting ADs)

]   ON HUMILITY: to err is human. To moo, bovine.   |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[
] [EMAIL PROTECTED] http://www.sandelman.ottawa.on.ca/ |device driver[
] panic(Just another Debian GNU/Linux using, kernel hacking, security guy); [


		

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Finger me for keys

iQCVAwUBPfUnDoqHRg3pndX9AQEghQQA57ZhokVCkMDIt8Xix4yu1tjCQEb9JmcD
ksrpBr60p3dN5TKnGiHn+qPX6cX0J1PSiiPckkLjN6x1HiKDScxEFncOIeWhx9L0
Zo6dDQIP64Abg4OsF3qiKEOgr5t5QOoMyr1By7f6Q97/iF8KzPQznLmASm+diipd
Oy7Y08BefpU=
=UHO4
-END PGP SIGNATURE-




--

Yu-Shun Wang [EMAIL PROTECTED]   Information Sciences Institute
   University of Southern California




Re: IETF Sub-IP area: request for input

2002-12-09 Thread Lars Eggert
Paul Hoffman / IMC wrote:


- The statement that some of the WGs in the SubIP area are about to
finish up may be deceptive. Some of the WGs are accepting new 
proposals on wide-ranging topics. 

This is an important point. An example is PPVPN, which is chartered to 
work on specification of requirements, with new protocol work being 
explicitly out-of-scope.

However, some current PPVPN IDs (and several more targetted at it) read 
more like solution documents for various existing vendor schemes, 
specifying packet headers and MIBs. Another indication is that those IDs 
 aim at standards track, whereas requirements documents would more 
naturally fall under Informational or maybe BCP.

So PPVPN at least seems quite happy to go out-of-scope, and is thus 
unlikely to stick to their given timeframe.

Lars

PS: I support 1/ - close SUB-IP and migrate the WGs.
--
Lars Eggert [EMAIL PROTECTED]   USC Information Sciences Institute


smime.p7s
Description: S/MIME Cryptographic Signature


RE: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Paul Hoffman / IMC
At 4:50 PM -0800 12/9/02, Tony Hain wrote:

If there were are real need for cross group
coordination within the sub-IP area, that would be a little clearer.


A presentation at the SubIP Area meeting in Atlanta drove home the 
point that the amount of coordination in the area was not as high as 
expected when the area started. The originally-envisioned hourglass 
(with CCAMP in the middle) turned into spaghetti. This is not to say 
that the spaghetti is bad, just that the proposed coordination didn't 
help keep them on track and therefore might be less needed than some 
are saying.

--Paul Hoffman, Director
--Internet Mail Consortium



Re: namedroppers, continued

2002-12-09 Thread Michael Froomkin - U.Miami School of Law
Blinded coins a la digicash
http://www.law.miami.edu/~froomkin/articles/oceanno.htm#xtocid583124

On Mon, 9 Dec 2002 [EMAIL PROTECTED] wrote:

 On Mon, 09 Dec 2002 17:47:58 EST, Edward Lewis said:
 
  Does anybody  have a reference on an authorization scheme that
  doesn't imply any authentication?
  
  World readable files.
 
 We know how to do that already ;)
 
 I was thinking more along the lines of a zero-knowledge proof or
 something like that - a scheme where you can prove you're authorized to
 do something(*) without having to prove who you are first.
 
 (*) and explicitly ruling out the 'null check, everybody is allowed' case ;)
 
 /Valdis
 
 

-- 
Please visit http://www.icannwatch.org
A. Michael Froomkin   |Professor of Law|   [EMAIL PROTECTED]
U. Miami School of Law, P.O. Box 248087, Coral Gables, FL 33124 USA
+1 (305) 284-4285  |  +1 (305) 284-6506 (fax)  |  http://www.law.tm
--It's warm here.--




Re: namedroppers, continued

2002-12-09 Thread John C Klensin


--On Monday, 09 December, 2002 17:49 -0500 Bill Cunningham
[EMAIL PROTECTED] wrote:

 I haven't personally tried myself to opt out. But I've read
 they have the form. If they told you they don't have a form to
 sort out junk mail for you I'd say they were full out it. I'd
 call the Postmaster General's office.

Bill,

For the US Post Office, they don't have the form.  In another
context, I've been over this with the Postal Inspection Service.
They have two other forms and models, one of which is probably
getting confused with this.

(1) You can decline to receive the particular form of junk mail
that is addressed to occupant, boxholder, or similar generic
terms.  For that, there is a form.

(2) You can also decide that particular types of materials,
identifed by specific description (nearly impossible in most
cases) or source is obscene.  Once you do that, and perform the
relevant rituals, it becomes illegal for identified sources to
send the stuff to you.  In general, you can't get the post
office to open all of your mail and do content filtering to be
sure it doesn't meet your criteria for obscenity.   And you
probably wouldn't want to, since that would require authorizing
them to open and read all of your mail.  But it can be an
effective way to prevent a particular sender for sending you
specific kinds of materials, since the penalties for sending
obscene materials through the mails are quite severe.

If it is addressed to you, by name and matching address, they
are, as Stephen indicated, legally required to deliver it
(unless it falls under the prohibitions of (2) above).  So,
oddly, you can opt out of untargeted mailings, but not out of
targeted ones.

john 





Re: IETF Sub-IP area: request for input (fwd)

2002-12-09 Thread Michael StJohns
At 09:55 PM 12/4/2002 +0100, Harald Tveit Alvestrand wrote:


The options seem to be:
1/ move WGs (back) to permanent areas: migrate the SUB-IP
working groups to other IETF areas sometime soon, likely before next
summer and close the SUB-IP area. Also, reconstitute the SUB-IP (and/or
other) directorates to ensure the continued coordination between the
remaining WGs.

2/ establish a long-term area: decide that the SUB-IP
area will be a long-term one, clearly define its charter, and ask the
nomcom to select one or two people to be Area Directors

3/ status quo: continue the SUB-IP Area as a temporary,
ad-hoc effort, much as it has been, with the IESG selecting two sitting
ADs to continue the effort that Bert  Scott have been doing. But maybe
give more responsibility to the working group's technical advisors,
normally the AD from the area where the working group might otherwise
live.



After reading through the discussions and thinking about the IETF needs as 
a whole, I want to propose a 4th alternative (which is a merge of the opt 2 
and 3):

a) Sunset the area with a final decision point as 12/31/2003 and a closing 
date of 03/01/2004.  No further WGs will be chartered in this area.
b) Ask the Nomcom to appoint 1 area director not from the current set of 
ADs for a term of 1 year. Term would run March 02 to March 03.

I think this approach would accomplish two things:  1) The area would be 
legitimized for the period of operation and that would bring it under 
normal IETF procedures.  2) We (the IETF) would have an opportunity to 
apprentice/train a new AD in a lower stress/load environment than the usual 
area.  In Dec 03, if there is sufficient reason to continue the area, the 
NOMCOM can act to continue the appointment or to appoint another or other 
ADs as well as more fully define the charter.  If not, the area can close 
in March.

Mike



Re: namedroppers, continued

2002-12-09 Thread Bill Cunningham

- Original Message -
From: John C Klensin [EMAIL PROTECTED]
To: Bill Cunningham [EMAIL PROTECTED]
Cc: Stephen Sprunk [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Monday, December 09, 2002 9:16 PM
Subject: Re: namedroppers, continued




 --On Monday, 09 December, 2002 17:49 -0500 Bill Cunningham
 [EMAIL PROTECTED] wrote:

  I haven't personally tried myself to opt out. But I've read
  they have the form. If they told you they don't have a form to
  sort out junk mail for you I'd say they were full out it. I'd
  call the Postmaster General's office.

 Bill,

 For the US Post Office, they don't have the form.  In another
 context, I've been over this with the Postal Inspection Service.
 They have two other forms and models, one of which is probably
 getting confused with this.

 (1) You can decline to receive the particular form of junk mail
 that is addressed to occupant, boxholder, or similar generic
 terms.  For that, there is a form.

 (2) You can also decide that particular types of materials,
 identifed by specific description (nearly impossible in most
 cases) or source is obscene.  Once you do that, and perform the
 relevant rituals, it becomes illegal for identified sources to
 send the stuff to you.  In general, you can't get the post
 office to open all of your mail and do content filtering to be
 sure it doesn't meet your criteria for obscenity.   And you
 probably wouldn't want to, since that would require authorizing
 them to open and read all of your mail.  But it can be an
 effective way to prevent a particular sender for sending you
 specific kinds of materials, since the penalties for sending
 obscene materials through the mails are quite severe.

 If it is addressed to you, by name and matching address, they
 are, as Stephen indicated, legally required to deliver it
 (unless it falls under the prohibitions of (2) above).  So,
 oddly, you can opt out of untargeted mailings, but not out of
 targeted ones.

 john

I checked 39USC and 39CFR955 I guess the postal service maintains a list if
you want to not receive mailing for sexually oriented materials,
sweepstakes, and pandering solicitations. But that's about it. As far as the
USPS goes.





RE: Reminder: Deadline for input on sub-ip discussion

2002-12-09 Thread Bill Strahm
I have an interesting set of questions for you Harold,
1) How effective would the IESG be with 2 more members, more effective,
or less
2) What would happen to any new IESG members in the SUB-IP area, if
the area is shut down ?

In otherwords, does the IESG think that a two new members would help
overall effectiveness, or make it lower

If the consensus of the IESG is that adding more members would make them
less effective go with the victim/temporary route.

If the consensus of the IESG is that adding two members would make the
IESG more effective, lets look at making it permanent, or have a place
to put the extra members when the temporary area shuts down.

In other words what makes that IESG more effective 

Bill


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
Harald Tveit Alvestrand
Sent: Monday, December 09, 2002 1:22 PM
To: [EMAIL PROTECTED]
Subject: Reminder: Deadline for input on sub-ip discussion


All,

On Wed Dec 4th, we asked for input to help us decide on the future of
the SUB-IP Area. See our posting at

  http://www.ietf.org/mail-archive/ietf/Current/msg18370.html

We had a large majority of people at the SUBIP Area meeting in Atlanta
expressing that they want the area to be long(er) lived. This will be
part of our input.

But we need/want to hear from the IETF community. So please express your
opionion (and the reasoning behind it) asap on [EMAIL PROTECTED], but 
certainly before Thursday Dec 12th 10am US Eastern time.

As expressed in the above posting (with data points and discussion 
included),
the 3 choices for the SUB-IP Area seem to be:

  1/ move WGs (back) to permanent areas: migrate the SUB-IP
 working groups to other IETF areas sometime soon, likely before
next
 summer and close the SUB-IP area. Also, reconstitute the SUB-IP
(and/or
 other) directorates to ensure the continued coordination between
the
 remaining WGs.

  2/ establish a long-term area: decide that the SUB-IP
 area will be a long-term one, clearly define its charter, and ask
the
 nomcom to select one or two people to be Area Directors

  3/ status quo: continue the SUB-IP Area as a temporary,
 ad-hoc effort, much as it has been, with the IESG selecting two
sitting
 ADs to continue the effort that Bert  Scott have been doing. But
maybe
 give more responsibility to the working group's technical advisors,
 normally the AD from the area where the working group might
otherwise
 live.

The opinions expressed so far seem to show clearly that the community is

divided on the issue, with perhaps some preference for the status quo 
(alternative 3).

If you have a strong preference for one (or two) of these, and have not
yet 
said so, please indicate your opinion (and your reasons) by mail to 
[EMAIL PROTECTED] before Thursday.

Thank you!

  Harald Alvestrand, for the IESG

(please repost this message where appropriate)






Re: Reminder: Deadline for input on sub-ip discussion

2002-12-09 Thread grenville armitage

Bill Strahm wrote:
 
 I have an interesting set of questions for you Harold,
 1) How effective would the IESG be with 2 more members, more effective,
 or less
 2) What would happen to any new IESG members in the SUB-IP area, if
 the area is shut down ?

I think this is a seductively reasonable-sounding-yet-misguided rephrasing
of the issue.

Sub-IP as an Area ought to be evaluated on its applicability to the
IETF. The IESG support (generally quite well and unthanked) the goals
of the IETF. If Sub-IP as an Area makes sense for the IETF, then (and
only then) does the question arise of whether to add more IESG members.
Let's not get the order reversed.

cheers,
gja
-- 
Grenville Armitage
http://caia.swin.edu.au